2025-07-01
Cloudflare
Message Signatures are now part of our Verified Bots Program, simplifying bot authentication
Amazon Security
Remote access to AWS: A guide for hybrid workforces
Schneier on Security
Iranian Blackout Affected Misinformation Campaigns
Malwarebytes
Facebook wants to look at your entire camera roll for “AI restyling” suggestions, and more
Dark Reading
Like SEO, LLMs May Soon Fall Prey to Phishing Scams
Dark Reading
We've All Been Wrong: Phishing Training Doesn't Work
White Knight Labs
Understanding Out-Of-Bounds in Windows Kernel Driver
Google Safety & Security
We are announcing Sparkasse as our first national credential partner for EU age assurance.
Github Security Blog
Understand your software’s supply chain with GitHub’s dependency graph
Leviathan Security
Integrating Security Metrics into Quality Models: A DORA-Aligned Strategy
Binarly
Check Your BMC Firmware Twice
Ars Technica Security
US critical infrastructure exposed as feds warn of possible attacks from Iran
Searchlight Cyber Research
How we got persistent XSS on every AEM cloud site, thrice
Microsoft Security
Planning your move to Microsoft Defender portal for all Microsoft Sentinel customers
2025-06-30
Schneier on Security
How Cybersecurity Fears Affect Confidence in Voting Systems
Malwarebytes
AT&T to pay compensation to data breach victims. Here’s how to check if you were affected
Malwarebytes
A week in security (June 23 – June 29)
Dark Reading
Why Cybersecurity Should Come Before AI in Schools
Meta Security
Meta joins Kotlin Foundation
Ars Technica Security
Drug cartel hacked FBI official’s phone to track and kill informants, report says
Krebs on Security
Senator Chides FBI for Weak Advice on Mobile Security
Microsoft Security
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-28
2025-06-27
Schneier on Security
Friday Squid Blogging: What to Do When You Find a Squid “Egg Mop”
Schneier on Security
The Age of Integrity
Eclypsium
Ars Technica: Actively exploited vulnerability gives extraordinary control over server fleets
Eclypsium
The Hacker News: CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
SpiderLabs
Tracing Blind Eagle to Proton66
Malwarebytes
Fake DocuSign email hides tricky phishing attempt
Dark Reading
'CitrixBleed 2' Shows Signs of Active Exploitation
Dark Reading
US Falling Behind China in Exploit Production
Github Security Blog
GitHub Advisory Database by the numbers: Known security vulnerabilities and what you can do about them
Ars Technica Security
Microsoft changes Windows in attempt to prevent next CrowdStrike-style catastrophe
Searchlight Cyber
Scattered Spider Shifts Focus to Insurance Industry
Microsoft Security
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching
2025-06-26
Schneier on Security
White House Bans WhatsApp
Talos Intelligence
Getting a career in cybersecurity isn’t easy, but this can help
Talos Intelligence
Decrement by one to rule them all: AsIO3.sys driver exploitation
Malwarebytes
Why the Do Not Call Registry doesn’t work
Dark Reading
How Geopolitical Tensions Are Shaping Cyber Warfare
Ars Technica Security
Actively exploited vulnerability gives extraordinary control over server fleets
Compass Security Blog
Pwn2Own Ireland 2024 – Ubiquiti AI Bullet
Palo Alto Networks
Global Reach — The New Scale of Chinese Cyberthreats
ReversingLabs
SAFE and Trusted: Why the Spectra Assure Community Badge Belongs on Your Open Source Project
2025-06-25
Schneier on Security
What LLMs Know About Their Users
Talos Intelligence
Cybercriminal abuse of large language models
Malwarebytes
Facial recognition: Where and how you can opt out
Dark Reading
Cloud Repatriation Driven by AI, Cost, and Security
Dark Reading
And Now Malware That Tells AI to Ignore It?
Dark Reading
CISA Is Shrinking: What Does It Mean for Cyber?
Dark Reading
XOR Marks the Flaw in SAP GUI
Snyk
Understanding CRA Compliance: Overcoming Challenges with an Integrated Security Testing Approach
Bishop Fox Security
Sipping from the CVE Firehose: How We Prioritize Emerging Threats for Real-World Impact
Ars Technica Security
Ubuntu disables Intel GPU security mitigations, promises 20% performance boost
Palo Alto Networks
Chart Your SASE Transformation with Prisma SD-WAN
Almond Offensive Security Blog
Deleting a file in Wire doesn’t remove it from servers — and other findings
Microsoft Security
Microsoft Named a Leader in the 2025 IDC CNAPP MarketScape: Key Takeaways for Security Buyers
ReversingLabs
How to Speed Up TPRM Approvals with Spectra Assure